Watch this video on YouTube
Identify the attack in which an attacker captures the data from an employee’s entry tag and copies it to another tag using a new chip to make unauthorized entry into the targeted organization’s premises.